SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject path traversal sequences such as ../ into the id value to escape the intended directory and delete arbitrary .json files on the server, including global configuration files and workspace metadata. This issue has been fixed in version 3.6.4.
References
| Link | Resource |
|---|---|
| https://github.com/siyuan-note/siyuan/releases/tag/v3.6.4 | Release Notes |
| https://github.com/siyuan-note/siyuan/security/advisories/GHSA-vw86-c94w-v3x4 | Third Party Advisory |
Configurations
History
20 Apr 2026, 16:50
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
B3log
B3log siyuan |
|
| References | () https://github.com/siyuan-note/siyuan/releases/tag/v3.6.4 - Release Notes | |
| References | () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-vw86-c94w-v3x4 - Third Party Advisory | |
| CPE | cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:* |
16 Apr 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-16 23:16
Updated : 2026-04-20 16:50
NVD link : CVE-2026-40318
Mitre link : CVE-2026-40318
CVE.ORG link : CVE-2026-40318
JSON object : View
Products Affected
b3log
- siyuan
CWE
CWE-24
Path Traversal: '../filedir'
